File: ipmasq-ZZZzzz_fail2ban.rul

package info (click to toggle)
fail2ban 1.1.0-9
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 4,076 kB
  • sloc: python: 23,095; sh: 527; xml: 352; perl: 344; makefile: 191
file content (31 lines) | stat: -rw-r--r-- 1,011 bytes parent folder | download | duplicates (10)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
#! /bin/sh
#
# ZZZzzz|fail2ban.rul
#
# Ultima modifica: 20060112 <Nauta@G-B.it> Creazione
# Ultima modifica: 20071205 <Nauta@G-B.it> Verifica sia in esecuzione
#
# Riconfigura le regole di filtraggio relative a fail2ban alla fine
# dell'inizializzazione delle regole.
# Solo all'avvio del sistema mostra la (ri)esecuzione dello script

_NAME=fail2ban
_INITSCRIPT=/etc/init.d/$_NAME
_CONFIG="/etc/$_NAME/$_NAME.local /etc/$_NAME/$_NAME.conf"

if [ -s $_INITSCRIPT ]; then
  SOCKFILE=`sed -n -e '/^[^#]*socket\s*=/{
	s/.*socket\s*=\s*\(\S\+\).*/\1/p;q}' $_CONFIG 2>/dev/null`
  [ -z "$SOCKFILE" ] && SOCKFILE="/tmp/$_NAME.sock"
  if [ -S "$SOCKFILE" ]; then # Is daemon running ?
    if [ "$SHOWRULES" = "yes" ]; then
      echo "#: Reinitializing $_NAME"
      echo $_INITSCRIPT force-reload
    else
      [ ! $runlevel ] && HIDEOUTPUT=true
    fi
    if [ "$NOACT" != "yes" ]; then
      eval $_INITSCRIPT force-reload ${HIDEOUTPUT:+\>/dev/null 2\>&1}
    fi
  fi # SOCKFILE is a socket
fi # _INITSCRIPT exist